[146244] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: XO blocking individual IP's

daemon@ATHENA.MIT.EDU (Blake T. Pfankuch)
Mon Nov 7 23:34:37 2011

From: "Blake T. Pfankuch" <blake@pfankuch.me>
To: "clayton@haydel.org" <clayton@haydel.org>, "nanog@nanog.org"
 <nanog@nanog.org>
Date: Tue, 8 Nov 2011 04:34:23 +0000
In-Reply-To: <741f8279bada1343342d857e18f7495d.squirrel@emailmg.ipower.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Oh yes!  Good lord I about went insane with this.  I was working with a cus=
tomer single homed to cBeyond.  I spent 3 hours on the phone with cBeyond t=
o figure out what was going on, it looks like a broken route.  Come to find=
 out it was an XO "security null".  The engineer on the phone from cBeyond =
said to me "Well, I have learned 2 things today.  1, XO nulls for 'security=
 purposes' at random.  2, I am no longer shocked by any ridiculous policy I=
 will ever come across again."

In this case majority traffic was going from cBeyond to anywhere (via XO) a=
nd being eaten, however it was VERY tough to diagnose as all parties involv=
ed assumed this would not be occurring between source and destination witho=
ut good public documentation or at least any record of this happening to so=
meone else.  Also I guess we all assumed that major bandwidth players don't=
 filter anything.

I personally think its good on paper, but very bad real life until there is=
 a way to notify the end customer of the violation quickly.  This issue lit=
erally took 3 full weeks to figure out what was going on.  Yes this works g=
reat in a colo datacenter as you have the customer contact info (hopefully)=
.  But in the case where my customers provider was having the IP filtered b=
y their transit it was hell to diagnose.  In my case the customer had a sin=
gle infected machine that was making outbound connections on TCP3389 in the=
 range of about 100 connections every 5 minutes and because of this was ent=
irely being "security nulled".

Blake

-----Original Message-----
From: clayton@haydel.org [mailto:clayton@haydel.org]=20
Sent: Monday, November 07, 2011 7:43 PM
To: nanog@nanog.org
Subject: XO blocking individual IP's


I'm hoping someone has had the same experiences, and is further toward a re=
solution on this than I am. About 6 months ago, we noticed that XO was blac=
kholing one specific IP out of a /24.  Traces to that IP stopped on XO's ne=
twork, traces to anything else out of the block went through fine.
XO finally admitted that they had a new security system that identifies sus=
picious traffic and automatically blocks the IP for 30 minutes.  We had to =
get the IP in question "whitelisted" by their security guys.  The traffic w=
as all legit, it was just on a high port # that they considered suspicious.

There have several more cases like this, and XO has not been forthcoming wi=
th information. We're either looking to be exempted from this filtering or =
at least get a detailed description of how the system works.  I'm not sure =
how they think this is acceptable from a major transit provider.
Anybody else had similar problems?


Clayton Haydel




home help back first fref pref prev next nref lref last post